{"id":42217,"date":"2021-06-25T00:00:00","date_gmt":"2021-06-25T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/f\/how-to-achieve-more-security-observability.html"},"modified":"2021-06-25T00:00:00","modified_gmt":"2021-06-25T00:00:00","slug":"cloud-native-security-more-security-observability-cloud-advocate","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/","title":{"rendered":"Cloud-Native Security: More Security Observability Cloud Advocate"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/f\/cloud-native-security--more-security-observability\/new-relic-dev.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/f\/cloud-native-security--more-security-observability\/new-relic-dev.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Systems continue to become even more distributed and complex, full observability, including security observability, into these applications is rising in importance for CloudOps and security practitioners. For developers, autonomous security observality throughout production drives quicker and cleaner innovation, all while appeasing security teams. Adopting a security observability strategy can provide visibility into cloud-native infrastructures, such as microservices, serverless and containers.<\/p>\n<p><b><span class=\"body-subhead-title\">Observability vs. visibility<\/span><\/b><\/p>\n<p>You\u2019ve probably heard a lot about why visibility through build to deployment is important, and observability may just seem like a fancier word that means the same thing, but, in security, they have different meanings:<\/p>\n<p>Visibility: Monitoring systems, networks, applications, and solutions to aggregrate data. Previously, organizations tried to achieve visibility by purchasing point products for every endpoint, but this led to lots of manual work putting the pieces together. APIs have enabled platform solutions that provide a single telemetry of truth for the entire infrastructure.<\/p>\n<p>Observability: This expands on monitoring and enables correlating and inspection of the data to provide defense in depth. There are three types of data needed to make a system observable: raw data (logs), metrics, distributed traces. You also need data analysis\/visualization tools to mine the data and identify patterns, improve AI and machine learning, and ultimately improve remediation.<\/p>\n<p>Think of visibility like Google Maps and observability is like Google Street View. Google Maps allows you to see the entire world and you can narrow in on certain locations for a more detailed view, but Google Street View allows you to walk around and see what\u2019s really going on. Similarily, visibility gives you the entire picture of your infrastructure, and observability helps you see what\u2019s happening inside your infrastructure.<\/p>\n<p><b><span class=\"body-subhead-title\">Benefits of observability for DevOps teams<\/span><\/b><\/p>\n<p>Visibility and observability are intertwined\u2014you cannot maximize security without incorporating both in your strategy. As a developer, you may shrug and think this isn\u2019t your concern, but incorporating observability into your pipeline benefits you as well:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Pre-production observability helps you start new projects with the cleanest code possible. Shifting security to the left allows you to make changes and fix potential issues <i>before<\/i> code enters production.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Monitors the application itself while its running so you have a significantly more accurate picture of potentially malicious behaviour. Now you can see when and where things went awry and fix accordingly.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Doesn\u2019t disrupt development\u2014integration with the pipeline makes testing part of your processes. With security teams no longer interrupting you to double check everything, you can build quickly and deploy with confidence.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Fosters a DevOps culture, which is key to being prepared for anything. More collaboration means problems can be solved quicker, since everyone is in the know and on the same page.&nbsp;<\/span><\/li>\n<\/ul>\n<p><b><span class=\"body-subhead-title\">How to implement observability<\/span><\/b><\/p>\n<p>Like a security guard outside of a store, your goal is to stop threats before they can enter your system and wreak havoc. Shifting security left (pre-production), helps you stop the bad guys at the door so you can work effectively.<\/p>\n<p>Trend Micro Cloud One has teamed up with New Relic to help cloud builders double down on their security observability posture. With this integration, you will complement your New Relic observability by adding visibility of your cloud security posture. Your cloud environment will be audited against hundreds of Amazon Web Services (AWS) and Microsoft Azure industry best practice checks to make your technology more reliable, secure, and cost efficient. All of this visibility is now embedded within your larger single-pane-of-glass observability view with New Relic.<\/p>\n<p><b><span class=\"body-subhead-title\">Putting cloud operational excellence into practice<\/span><\/b><\/p>\n<p>By using New Relic\u2019s <a href=\"https:\/\/github.com\/newrelic-experimental\/newrelic-connector-trendmicro-cloud-one-conformity\" target=\"_blank\" rel=\"noopener\">integration<\/a> that enables our AWS and Azure customers to bring in their cloud service data, you will leverage New Relic\u2019s rich search interface that can be used to create new dashboards and identify insights for your cloud services with a unified view. This can quickly be done with New Relic\u2019s <a href=\"https:\/\/newrelic.com\/signup\" target=\"_blank\" rel=\"noopener\">free tier<\/a> or free <a href=\"https:\/\/cloudone.trendmicro.com\/SignUp.screen\" target=\"_blank\" rel=\"noopener\">30-day trial<\/a> of Trend Micro Cloud One.<\/p>\n<p>This integration of Trend Micro Cloud One\u2122 \u2013 Conformity with New Relic relies on <a href=\"https:\/\/www.cloudconformity.com\/help\/communication\/communication-channels\/amazon-sns-communication.html\" target=\"_blank\" rel=\"noopener\">Amazon SNS integration<\/a>. With this integration, you will complement your AWS observability by adding in Conformity monitoring, now using your New Relic account. The integration is open sourced in New Relic\u2019s <a href=\"https:\/\/github.com\/newrelic-experimental\/newrelic-connector-trendmicro-cloud-one-conformity\" target=\"_blank\" rel=\"noopener\">GitHub repository<\/a> and is packaged as an AWS solution using the <a href=\"https:\/\/www.serverless.com\/\" target=\"_blank\" rel=\"noopener\">serverless framework<\/a>. After you\u2019ve deployed Conformity to your Amazon Simple Storage Service (S3) buckets, the New Relic integration deploys a AWS CloudFormation stack in your account.<\/p>\n<p>Building a business in the cloud requires a consistent set of rules to help provide guidelines for teams around the world as they deploy assets and create systems at any time. Leveraging the design principles of the AWS and Azure Well-Architected framework not only helps you avoid breaches, but also ensures you\u2019re building successful cloud operations and governance practices for high-performing and efficient cloud infrastructure.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/build-a-complete-cloud-visibility-strategy.html\" target=\"_blank\" rel=\"noopener\">Learn more about this new exciting integration<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/f\/how-to-achieve-more-security-observability.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore observability vs. visibility, how they differ, how they are intertwined, and why they should be incorporated into your security strategy. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42218,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9504,9506,9507],"class_list":["post-42217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-compliance","tag-trend-micro-devops-expert-perspective","tag-trend-micro-devops-multi-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud-Native Security: More Security Observability Cloud Advocate 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud-Native Security: More Security Observability Cloud Advocate 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cloud-native-security-more-security-observability-cloud-advocate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cloud-Native Security: More Security Observability Cloud Advocate\",\"datePublished\":\"2021-06-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/\"},\"wordCount\":822,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-native-security-more-security-observability-cloud-advocate.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : Compliance\",\"Trend Micro DevOps : Expert Perspective\",\"Trend Micro DevOps : Multi Cloud\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/\",\"name\":\"Cloud-Native Security: More Security Observability Cloud Advocate 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-native-security-more-security-observability-cloud-advocate.jpg\",\"datePublished\":\"2021-06-25T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-native-security-more-security-observability-cloud-advocate.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-native-security-more-security-observability-cloud-advocate.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-native-security-more-security-observability-cloud-advocate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud-Native Security: More Security Observability Cloud Advocate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud-Native Security: More Security Observability Cloud Advocate 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/","og_locale":"en_US","og_type":"article","og_title":"Cloud-Native Security: More Security Observability Cloud Advocate 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-25T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cloud-native-security-more-security-observability-cloud-advocate.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cloud-Native Security: More Security Observability Cloud Advocate","datePublished":"2021-06-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/"},"wordCount":822,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cloud-native-security-more-security-observability-cloud-advocate.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : Compliance","Trend Micro DevOps : Expert Perspective","Trend Micro DevOps : Multi Cloud"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/","url":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/","name":"Cloud-Native Security: More Security Observability Cloud Advocate 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cloud-native-security-more-security-observability-cloud-advocate.jpg","datePublished":"2021-06-25T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cloud-native-security-more-security-observability-cloud-advocate.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cloud-native-security-more-security-observability-cloud-advocate.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cloud-native-security-more-security-observability-cloud-advocate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"Cloud-Native Security: More Security Observability Cloud Advocate"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42217"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42217\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42218"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}